27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running phpWebThings, a PHP web development framework. This version of<br />

phpWebThings is vulnerable to a SQL Injection flaw. An attacker exploiting this flaw<br />

would send a malformed query to the download.php script. Successful exploitation would<br />

allow the attacker to execute commands on the backend SQL database. This can lead to<br />

loss of confidential materials as well as compromise of the integrity of the SQL database<br />

server.<br />

Solution: No solution is known at this time.<br />

CVE-2005-3676<br />

Moodle < 1.5.3 Multiple Scripts SQL Injection<br />

<strong>PVS</strong> ID: 3291 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Moodle, an open-source content-management system written in PHP. This<br />

version of Moodle is vulnerable to a SQL Injection flaw. An attacker exploiting this flaw<br />

would send a malformed request to one of the affected PHP scripts. Successful exploitation<br />

would result in the attacker executing arbitrary commands against the backend SQL server.<br />

This would lead to a loss of confidential material, possible loss of database integrity, and<br />

possible loss of availability.<br />

Solution: Upgrade to version 1.5.3 or higher.<br />

CVE-2005-3648<br />

Sony XCP-DRM Rootkit Detection<br />

<strong>PVS</strong> ID: 3292 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote host is running the Sony XCP-DRM Rootkit. While not<br />

malicious in nature, the Sony software hides itself on the target host and monitors copying.<br />

Solution: Ensure that this software is compliant with corporate policies and procedures. While some<br />

third party vendors are offering a tool to remove the software, it is recommended that you<br />

contact the vendor for an uninstall tool.<br />

CVE Not available<br />

Xoops < 2.2.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3293 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Xoops installed on the remote host is prone to several vulnerabilities. These include HTML<br />

Injection, SQL Injection, and Directory traversal flaws. An attacker exploiting these flaws<br />

would be able to retrieve confidential data from the remote server, execute arbitrary SQL<br />

commands on the remote database server, and execute malicious code within the browser<br />

Family Internet Services 848

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!